informa

Security Monitoring

Name That Toon: Nowhere to Hide
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 18, 2022
1 min read
Article
Flashpoint Acquires Risk Based Security
Flashpoint plans to integrate Risk Based Security data and technology into its platform to boost threat intelligence and vulnerability management.
January 12, 2022
Flashpoint plans to integrate Risk Based Security data and technology into its platform to boost threat intelligence and vulnerability management.
by Dark Reading Staff, Dark Reading
January 12, 2022
1 min read
Article
5 Things to Know About Next-Generation SIEM
NG-SIEM is emerging as a cloud- and analytics-driven alternative to legacy SIEMs. Based on new research, Omdia highlights five important new insights for anyone considering a NG-SIEM purchase.
January 11, 2022
NG-SIEM is emerging as a cloud- and analytics-driven alternative to legacy SIEMs. Based on new research, Omdia highlights five important new insights for anyone considering a NG-SIEM purchase.
by Eric Parizo, Principal Analyst, Omdia
January 11, 2022
6 min read
Article
The World Is Increasingly Controlled and Transformed by Algorithms
Our digital interactions are being analyzed, predicted, and protected by algorithms and serve as a strategic, digital arsenal in defending against cyberattacks.
January 05, 2022
Our digital interactions are being analyzed, predicted, and protected by algorithms and serve as a strategic, digital arsenal in defending against cyberattacks.
by David Schiffer, CEO, RevBits
January 05, 2022
5 min read
Article
Google Buys Siemplify to Get Ahead in Cloud Security
Google says the deal will bring security orchestration, automation, and response to its Google Cloud security portfolio and expand its Chronicle platform.
January 04, 2022
Google says the deal will bring security orchestration, automation, and response to its Google Cloud security portfolio and expand its Chronicle platform.
by Robert Lemos, Contributing Writer
January 04, 2022
5 min read
Article
Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft
Most companies lack the proper tools to assess their vulnerability to threats facing their AI systems and ML pipelines, prompting Microsoft to release a risk assessment framework.
December 15, 2021
Most companies lack the proper tools to assess their vulnerability to threats facing their AI systems and ML pipelines, prompting Microsoft to release a risk assessment framework.
by Robert Lemos, Contributing Writer
December 15, 2021
4 min read
Article
Tool Overload & Attack Surface Expansion Plague SOCs
Security professionals are burning out from handling too many tools and facing a growing number of threats, and more than 40% see lack of leadership as the main problem.
December 14, 2021
Security professionals are burning out from handling too many tools and facing a growing number of threats, and more than 40% see lack of leadership as the main problem.
by Robert Lemos, Contributing Writer
December 14, 2021
4 min read
Article
Logiq.ai Tackles Observability Problem With LogFlow
LogFlow addresses data risks associated with machine data pipelines.
December 03, 2021
LogFlow addresses data risks associated with machine data pipelines.
by Dark Reading Staff, Dark Reading
December 03, 2021
2 min read
Article
VMware Carbon Black MDR Helps Analysts Respond to Attacks
Carbon Black’s new managed detection and response solution monitors endpoints and workloads, freeing up security teams to understand the different types of attacks that might be heading their way.
December 01, 2021
Carbon Black’s new managed detection and response solution monitors endpoints and workloads, freeing up security teams to understand the different types of attacks that might be heading their way.
by Dark Reading Staff, Dark Reading
December 01, 2021
2 min read
Article
Legal Cases and Privacy Rulings Aim to Curtail Facial Biometrics
Decisions in the UK and Australia, and lawsuits in the United States, could force facial-recognition providers to remove data from their machine-learning models.
November 30, 2021
Decisions in the UK and Australia, and lawsuits in the United States, could force facial-recognition providers to remove data from their machine-learning models.
by Robert Lemos, Contributing Writer
November 30, 2021
6 min read
Article
Google Analyzes Methods Behind GCP Workload Attacks
The vast majority of cloud workload compromises stem from poor security configurations or compromised passwords, while cryptojacking is the common payload, research shows.
November 29, 2021
The vast majority of cloud workload compromises stem from poor security configurations or compromised passwords, while cryptojacking is the common payload, research shows.
by Robert Lemos, Contributing Writer
November 29, 2021
4 min read
Article
Cybercriminals Increasingly Employ Crypto-Mixers to Launder Stolen Profits
Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.
November 16, 2021
Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.
by Robert Lemos, Contributing Writer
November 16, 2021
4 min read
Article
3 Must-Know Technologies to Protect Your Hybrid Workforce
Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users.
November 15, 2021
Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users.
by Mary Blackowiak, Lead Product Marketing Manager, AT&T Cybersecurity
November 15, 2021
5 min read
Article
Open Source Project Aims to Detect Living-Off-the-Land Attacks
The machine learning classifier from Adobe can determine whether system commands are malicious and classify them using a variety of tags useful for security analysts.
November 12, 2021
The machine learning classifier from Adobe can determine whether system commands are malicious and classify them using a variety of tags useful for security analysts.
by Robert Lemos, Contributing Writer
November 12, 2021
4 min read
Article
Follow the Leaders: A Blueprint for Software Security Success
Organizations can study software security leaders and emulate their habits and initiatives in order to build a successful software security program of their own.
November 12, 2021
Organizations can study software security leaders and emulate their habits and initiatives in order to build a successful software security program of their own.
by Jacob Ewers, Principal Security Consultant, Synopsys Software Integrity Group
November 12, 2021
4 min read
Article